I'm new to Hashcat and hash-cracking in general, so bear with me please.
I have a 54 character long string from which only four characters are missing; the rest are known. I also have the complete string's GOST hash. I want to know if there is a way to Brute-force the hash using the 54 character string to obtain those missing characters, and subsequently the whole string.
I tried to create a table file, but it went on to become 20+ GB huge before I quit Hashcat in fear of running out of space. I also tried to combine rules and charset by passing
Code:
-1 ?l?u?d
as a parameter and putting
Code:
s*?1
in the .rule file (where the missing characters are represented by * in the hash file). Apparently that's not allowed. I also don't want to go deep into shell-scripting, since that would mean learning a whole new language just to crack a code. My brain is already rattled by Python and C as it is. Oh, and I'm on Windows 8.1.
So is there a way that I've overlooked? Is there some trick or technique that you learn only from experience?
I've managed to configure hashcat to crack some hashes on mac osx, the only problem is it is rather slow and i have approx 1500 hashes i want to crack. according to hashcat it would take a few days for this to occur.
my question is, is there any way of increasing CPU usage for hashcat to make it faster or is it already set to fastest possible settings?
also im trying to crack phpass, MD5(Wordpress), MD5(phpBB3), MD5(Joomla) hashes, so far 7 cracked out of a possible 1500 but it has already taken many hours.
So I'm wondering if it would be possible to have the output look like this:
e99a18c428cb38d5f260853678922e03
8f036369a5cd26454949e594fb9e0a2d
hello123
b8f8312b939f00abb38eeafd4fd107f3
Etc. Would this be possible?
If so, what code do I need to use?
I am a complete noob in hash cat , i have a geforce gt 540 m graphics card with cuda & i wanna crack a wpa2 pass word please suggest me good tutorial with details on how to use hash cat with various attacks, i have searched online & i found a few videos on youtube but one of them led to no output & the following the second one hashcat fails to recognize .hccap file.
please i need help.
i am using cuda hashcat 64 bit v 1.35
thanks in advance.
Image may be NSFW. Clik here to view.hash cat.jpg (Size: 100.31 KB / Downloads: 1)
I am having trouble with descrypt cracking performance. It used to be fast (v1.31) but now it is going slow for me (v1.33 or v1.35). Benchmarks reveal the same numbers for each version and so do short runs but once I get a big enough dictionary, everything falls apart. It was suggested to me to try piping (shown below) but that didn't fix the problem.
Detailed below, both releases were freshly un-7zr'd immediately prior to testing. I use the same rules, same dictionary and same test hashes in both tests. The only thing that changes is the cuda version. The same problem occurs with 1.35.
Greetings, so basically I have a Accelerated Processing Unit from AMD and am I only limited to hashcat because I've tried oclHashcat and it doesn't seem to work properly even though I have the latest version of Catalyst Control Panel (V. 14.9) the only way I could somewhat get it to work is if I --force it in Cmd prompt.
-Note: hashcat works perfectly fine for me.
I'm not sure if APU's are supported or something else, I would very much appreciate it if I could get some feedback from you guys. Thank you for taking your time for reading this and understanding my predicament.
Well, I finally got oclHashcat (cuda) running on Kali-linux. I am using the Nvidia GTX-750ti. I have been messing with dictionary attacks, combinations and mostly mask attacks. Some time ago I encrypted a Sandisk 32 Gb drive. Not only did I encrypt it with a password, I did it after I had taken my Ambien. Needless to say, I might as well have had my neighbor come over and put in a password because I have no idea what it is. The one thing I am confused about is salts. I understand what they are, websites use them all the time because a lot of people use simple passwords. When I was digging around in the Sandiskdrive, I found two hashes. I put them into the Hash-Id and they are SHA-512's. I am confused because I thought a salt was a simple phrase that was then combined with your password giving you one hash? I've included a pic. The hashes are
"6401c89f3971af3fd2819e574ac2576b40a601e0b01863153162cc0db6ddfe15"
-and -
"8b3da1a5185f3a257cbf82bfe10855428a0cf33593294fddec5b4c76f3bd3d4e1a805f4b8663ff1af8207e87d848d2d5f60b6d1d45db79398886a42aaeee6d22"
If anyone could point me in the right direction, I would be so grateful.
Thanks
I have tried rockyou & crackstation wordlists and no result.
I am looking at using brute force mode. I need some help on using masks.
The password is >= 8 char with upper, lower-case, numbers and special char.
1.
Is this mask correct:
-1 ?l?u?d?s ?1?1?1?1?1?1?1?1
2.
If I chose a shorter mask, e.g. a 6/7-char mask, will a partial clear-text be retrieved? Or is it so if the password is 8-char, I must give a 8-char mask?
3.
Are there any rules that I can use for such brute force?
I plan to build a system for the company I work for.
Can someone give me some hardware advice.
Requirements:
- Rack based server
- Space for 4 to 6 cards (depends on the number of GPUs)
(What's the max number of GPUs supported ?)
Required information.
- Prefered server case (in connection with cooling and power supply)
- Prefered motherboard
- Prefered graphic cards (it seems that AMD is preferred - price-speed ratio)
- Prefered power supply (one or more)
Intended for all kind of calculations (oclHashcat/cudaHascat)
Hello everyone, i'm new in hashcat (never used before) although i've used similar gpu cracking tools like pyrit.
I'm setting up and old computer as a remote computation (cracking) server, with kali and a few tools installed, trying to get as much power from the old hardware as i can.
I have already pyrit running with cuda and my old force 8300 gs, it works fine with both cuda and pyrit, not problem at all (very slow card but thats another thing).
I've messed around a bit until i get cudahascat working on my pc (i only had hashcat which don't use gpu acceleration, so i finally get cudahashcat and tried benchmarks and examples to see if works fine.
ERROR: Shader Model 1.0 - 1.3 based GPU detected. Support for CUDA was dropped by NVidia.
Remove it from your system or use -d and select only supported cards.
and thats all i can do with cudahashcat. Googling a bit i see that my gpu could be no longer supported by nvidia and cuda but as i have it working with cuda and pyrit i wonder if is possible to fix this error and use it with hashcat.
Sorry about my english, i think i don't miss any information so hope can solve this easily.
60% faster than AMD Radeon R9 290X at stock clocks – up to 85% faster with +225 Mhz OC.
Measured maximum 273W draw from the wall (100% load, 100% fan, +225 Mhz OC). PSU is 86% efficient, so card itself is drawing ~ 234W. That's about 17% less than the R9 290X.
First single GPU to break 35 GH/s on NTLM. Can actually break 40 GH/s with +275 Mhz OC, but it's not stable for all algorithms at this clockrate.
Max observed GPU temperature is 64C at 100% fan (22.7C ambient temp, no external air flow)
Hands-down the best GPU you can buy for Hashcat right now!
We're waiting on more chassis to arrive to test this in the Sagitta Brutalis. We should have 8x Titan X benchmarks posted by the end of the week, but the single GPU benchmarks show that a single Sagitta Brutalis with 8x Titan X will be nearly as fast as our old 25-GPU VCL cluster combined!
Hello
Is there a way to make a 8 digit long mask with Only UpperCase Letters and Numbers, so the password looks somthing like this: GF66IT9H, it can also look like this 9Z7XT8TR or like this XX66XRHO or this UIPFXXXC
how can i create a mask that makes 8 digit long password with random Numbers and Upper Case Letters? or is this not possible?
This version 1.36 is a wild mix of nice updates Image may be NSFW. Clik here to view.
Still, all oclHashcat versions back to 1.33 share the same driver dependencies for AMD. If you have a running oclHashcat v1.33 or newer then v1.36 will work, too, without a driver update.
Most important changes:
Added new hash mode -m 11300 = Bitcoin/Litecoin wallet.dat
Added new hash mode -m 11600 = 7-Zip
Fixed a bug in NVidia multihash kernels: MD5, NTLM, IPB2
The parameters --show / --left do work with both halves of LM hashes (if they were 32 hex chars long)
Optimized final round flushing (reduces time at last percents of progress with slower speed)
Optimized rejection handling (for example passwords > 8 if cracking DEScrypt or < 8 if cracking WPA/WPA2, etc)
The speed in status display is no longer divide by the number of uncracked salts
Has anyone considered that the hashtopus program that currently exists is kinda outdated and the Web client doesn't look that great either.
I was wondering if anyone would want to create an 'official' hashtopus?
Perhaps one of the developers of hashcat to make sure it's optimized.
I'd love to help create the web sided client to make it look nice.
But an optimized Hashtopus like program to allow distributed hash cracking would be absolutely awesome, especially if you'd be able to have a nice view at the same time.